Domain-specific languages: an annotated bibliography
ACM SIGPLAN Notices
Yet Another Local Search Method for Constraint Solving
SAGA '01 Proceedings of the International Symposium on Stochastic Algorithms: Foundations and Applications
An Open-Ended Finite Domain Constraint Solver
PLILP '97 Proceedings of the9th International Symposium on Programming Languages: Implementations, Logics, and Programs: Including a Special Trach on Declarative Programming Languages in Education
Network management with Nagios
Linux Journal
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Constraint-Based Local Search
Introduction to the cell multiprocessor
IBM Journal of Research and Development - POWER5 and packaging
Nagios: System and Network Monitoring
Nagios: System and Network Monitoring
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
Principles of Constraint Programming
Principles of Constraint Programming
Programming constraint services: high-level programming of standard and new constraint services
Programming constraint services: high-level programming of standard and new constraint services
Using constraints for intrusion detection: the NeMODe system
PADL'11 Proceedings of the 13th international conference on Practical aspects of declarative languages
Hi-index | 0.00 |
Network Monitoring and Intrusion Detection Systems plays an important role in today's computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures. In this paper we present a preliminary specification and analysis of a network monitoring and intrusion detection concept system based on constraint programming, implemented on several constraint solver systems. This concept allows to describe the desirable network situations through constraints on network entities, allowing a more expressive and clear way of describing network situations.